Internet Protocol Security (IP Sec)

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Internet Security CSCE 813 IPsec
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Guide to Network Defense and Countermeasures Second Edition
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CSCE 715: Network Systems Security
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Securing Network Communications Using IPSec Chapter Twelve.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
IP Security
IPSec Detailed Description and VPN
Chapter 5 Network Security Protocols in Practice Part I
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Chapter 18 IP Security  IP Security (IPSec)
SECURING NETWORK TRAFFIC WITH IPSEC
Virtual Private Network zswu
Presentation transcript:

Internet Protocol Security (IP Sec)

Securing Intranets and Extranets at all levels

Major Cryptographic Systems Layer Cryptographic System Application Kerberos Transport SSL/TLS WAN e.g. Internet IPsec Data Link PPTP, L2TP (really only a tunneling system) Physical Not applicable. No messages are sent at this layer—only individual bits

Securing Network Communication: What Are the Challenges? Challenges to securing network communication include: Preventing data modification while in transit Preventing data from being read and interpreted while in transit Keeping data secure from unauthorized users Keeping data from being captured and replayed

What Is Internet Protocol Security? IPSec: A framework of open standards to ensure private, secure communications over IP networks through the use of cryptographic security services IPSec provides the following benefits: Transparent to users and applications Provides restricted access to servers Customizable security configuration Centralized IPSec policy administration through Active Directory Supports authentication and encryption of traffic. Certifies the originator of the packet. Protects the data from interception and tampering while in transit.

Application of IPsec to protect data packets

IPsec IPSec consists of two Internet protocol extensions: the Authentication Header (AH) and the Encapsulating Security Payload (ESP) that support creation of secure networks. Access is controlled by a companion key management protocol called the Internet Key Exchange (IKE).

IPsec Together, IPSec and IKE ensure that authorized parties may exchange private IP packets securely over a public network. Packet content is kept confidential by applying encryption and protected against modification through digital signing. IPSec can be used to securely “tunnel” packets to routers or firewalls over a WAN, or to securely “transport” packets end to- end between desktops and servers.

IPsec Operation: Transport Modes Site Network Site Network Secure Connection Security in Site Network Security in Site Network Extra Software Required Extra Software Required 3. IPSEC (IP SECURITY) Unit 6 noted that virtual private networks (VPNs) use a family of security standard collectively called IPsec (IP security). This section looks at IPsec in more depth. 3.1. Secure communication Systems and internet Layer Protection: SSL: Transport Layer Security Secure Socket Layer (SSL), which the IETF calls Transport Layer Security, as the latter name indicates, operates at the transport layer. This allows it to protect multiple applications. IPsec: Internet Layer Security In contrast, IPsec operates at the internet layer. This allows it to provide security for the transport layer, including all TCP and UDP traffic, and all other traffic carried in the data field of the IP packet, including ICMP and OSPF and even tunneled IP packets and PPP packets, as discussed later in this unit. IPsec for Both IPV4 and IPV6 IPsec was originally intended for the new version of the Internet Protocol, IP Version 6 (IPv6). However, it was actually created so that it can be used with IP Version (IPv4) as well. In other words, no matter which version of IP your network uses, IPsec will protect it. 3.2. Transport and Tunnel Modes The most basic concept in IPsec is that there are two IPsec modes, that is, ways of operating. As Figure 1 indicates, these are the transport mode and the tunnel mode. We looked at tunnel mode in Unit 6 (VPN). Transport Mode As Figure 1 indicates, transport mode is used for host-to-host security. Transport mode allows two hosts to communicate securely without regard to what else is happening on the network. The figure notes that an IPsec header is inserted after the main IP header. As cussed below, this header provides protection for higher-layer protocols, that is, transport and application layer protocols. In some cases, it may also provide limited protection for the IP header before it. However, because the IP destination address is needed to route the packet to the de nation host, the IP header must be transmitted in the clear, without encryption. This allows a snooper listening to the network traffic to understand your distribution of addresses, and this can lead to certain types of attacks. Tunnel Mode In contrast, Figure 1 shows that tunnel mode normally is used to protect communication between two IPsec servers at different sites. These servers send traffic between sites through the Internet in secure "tunnels." We saw this mode in unit 6. In tunnel mode, even the original IP header is fully protected. The transmitting IP server encapsulates the original IP packet in a new IP packet by adding a new IP header and an IPsec header. Encapsulating a protocol's message within another protocol message at the same layer (in this case, an IP packet within another IP packet) is known as tunneling. The destination address in the new IP header is the IP address of the destination IPsec server, not the IP address of the ultimate destination host. Therefore, if an adversary snoops on the company's traffic, the only IP addresses it will see will be those of the site security servers. The adversary will learn nothing about other IP addresses. The source IPsec server receives original IP packets and encapsulates them as shown in the figure. The receiving IPsec server, in turn, de-encapsulates the original IP packet sends it on its way to the destination host within the receiving IPsec server's site network. Combining Modes The two IPsec modes cai1 be combined. For instance, two hosts may use transport mode for end-to-end security. At the same time, their packets may be intercepted by IF servers at their sites for tunneling through the Internet to the IPsec server at the other site. For this to happen, the source host would add transport mode IPsec security to each outgoing packet. The source IPsec server would then encapsulate each packet within a tunnel mode IP packet. The receiving IPsec server would de-encapsulate the original packet and pass it on to the destination host. The destination host would then remove the transport mode security and read the information contained in the packet's data field. Secure on the WAN e.g. Internet

IPsec Operation: Tunnel Modes Server IPsec Server Site Network Site Network Tunneled Connection No Security in Site Network No Security in Site Network No Extra Software No Extra Software Secure on the WAN e.g. Internet

Tunnel vs. Transport Mode IPSec

Security Association (SA) One of the most important concepts in IPSec is called a Security Association (SA). Defined in RFC 1825. SAs are the combination of a given Security Parameter Index (SPI) and Destination Address. SAs are one way. A minimum of two SAs are required for a single IPSec connection.

Security Association (SA) SAs contain parameters including: Authentication algorithm and algorithm mode Encryption algorithm and algorithm mode Key(s) used with the authentication/encryption algorithm(s) Lifetime of the key Lifetime of the SA Source Address(es) of the SA Sensitivity level (ie Secret or Unclassified)

How IPSec works: Phase 1 Internet Key Exchange (IKE) is used to setup IPSec. IKE Phase 1: Establishes a secure, authenticated channel between the two computers Authenticates and protects the identities of the peers Negotiates what SA policy to use Performs an authenticated shared secret keys exchange Sets up a secure tunnel for phase 2 Main Mode or Aggressive mode

How IPSec works: Phase 1 Main Mode IKE Aggressive Mode IKE Negotiate algorithms & hashes. Generate shared secret keys using a Diffie-Hillman exchange. Verification of Identities. Aggressive Mode IKE Squeezes all negotiation, key exchange, etc. into less packets. Advantage: Less network traffic & faster than main mode. Disadvantage: Information exchanged before a secure channel is created. Vulnerable to sniffing.

Establishing IPsec Security Associations Using IKE Internet Key Exchange Security Association UDP Port 500 Party A Party B First establish IKE association and protected session Then create IPsec SAs within the Protection of the IKE session. IPsec SAs

How IPSec works: Phase 2 An AH or ESP packet is then sent using the agreed upon “main” SA during the IKE phase 1. IKE Phase 2 Negotiates IPSec SA parameters Establishes IPSec security associations for specific connections (like FTP, telnet, etc) Renegotiates IPSec SAs periodically Optionally performs an additional Diffie-Hellman exchange

How IPSec works: Communication Once Phase 2 has established an SA for a particular connection, all traffic on that connection is communicated using the SA. IKE Phase 1 exchange uses UDP Port 500. AH uses IP protocol 51. ESP uses IP protocol 50.

3-phase strategy in general terms that can be applied to many different enterprises Phase One: A Simple, Generic Policy

3-phase strategy in general terms that can be applied to many different enterprises Phase Two: Custom Workgroups

Phase Three: Adding Trust Infrastructure Replacing pre-shared keys with credentials enabling strong authentication. In homogenous Windows environments, Kerberos tickets might be used. In all other environments, including mixed Windows networks; a Public Key Infrastructure should be used. IPSec partners can be authenticated with “raw” public keys, but most enterprises will prefer X.509 digital certificates verified by a trusted CA. PKI combines strong access control with scalable administration through the use of CA hierarchies, cross-certification, and delegation.